<formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula> Out of <formula formulatype="inline"><tex Notation="TeX">$n$</tex></formula> Region Incrementing Scheme in Visual Cryptography

  title={<formula formulatype="inline"><tex Notation="TeX">\$k\$</tex></formula> Out of <formula formulatype="inline"><tex Notation="TeX">\$n\$</tex></formula> Region Incrementing Scheme in Visual Cryptography},
  author={Ching-Nung Yang and Hsiang-Wen Shih and Chih-Cheng Wu and Lein Harn},
  journal={IEEE Transactions on Circuits and Systems for Video Technology},
Recently, Wang introduced a novel (2, <i>n</i> ) region incrementing visual cryptographic scheme (RIVCS), which can gradually reconstruct secrets in a single image with multiple security levels. In RIVCS, the secret image is subdivided into multiple regions in such a way that any <i>t</i> shadow images, where 2 ≤ <i>t</i> ≤ <i>n</i>, can be used to reveal the (<i>t</i>-1) th region. However, Wang's scheme suffers from the incorrect-color problem, which the colors of reconstructed images may be… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 43 references

Secret image sharing

Computers & Graphics • 2002
View 4 Excerpts
Highly Influenced

Visual Cryptography

View 4 Excerpts
Highly Influenced

Visual Cryptography and Secret Image Sharing

J. Electronic Imaging • 2012
View 1 Excerpt

A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images

K. H. Lee, P. L. Chiu
Opt. Commun., vol. 284, no. 12, pp. 2730–2741, Jun. 2011. • 2011

A general multi-secret visual cryptography scheme

C. N. Yang, T. H. Chung
Opt. Commun., vol. 283, no. 24, pp. 4949–4962, Dec. 2010. • 2010
View 1 Excerpt

Constructions and properties of k out of n scalable secret image sharing

C. N. Yang, S.-M. Huang
Opt. Commun., vol. 283, no. 9, pp. 1750–1762, 2010. • 2010

Multi-secret Visual Cryptography Based on Reversed Images

2010 Third International Conference on Information and Computing • 2010

Similar Papers

Loading similar papers…